Abstract:
A protocol designing method that securely performs a password-based authentication and key exchange protocol using a zero-knowledge interactive proof is disclosed. According to this method, various kinds of system parameters required for authentication are first set. Then, a user selects a certain random number in conformity with the set parameters, and sends to a server a message including a user ID, a test number A applying a one-way function, and a first question number generation value X known only to the server and the user. The server, using the message sent from the user, sends to the user a message including an authentication Auth of whether the server possesses a public key, and a second question number generation value Y known only to the server and the user. The user authenticates the server by verifying the authentication Auth, and computes a resultant value c of a secret coin tossing known only to the server and the user and a session key SK. Thereafter, the user sends to the server a witness number B for user authentication. The server that stores a password verifier V for the respective user verifies the witness number B using the value c, and exchanges the session key SK by computing the session key SK. Accordingly, a secure authentication and key exchange can be performed only using the password without the necessity of any tool such as a smart card.
Abstract:
PURPOSE: An authentication method using symmetrical and asymmetrical authentication key exchange is provided which has a mathematical stability proof as to offline dictionary attack and does not have a large amount of calculation and communication. CONSTITUTION: According to the authentication method, every kind of system parameters required in the authentication are established. A user selects a random number(r) on the basis of the established parameter, and a message having a test number is transmitted to an authentication server. The authentication server is certified by performing symmetrical authentication and key exchange between a user computer and the authentication server, and the authentication server and the user computer share a temporal session key. The authentication server transmits a random number(t) to the user computer. The user computer generates an inquiry number(c) using the random number(t) and the temporal session key(tsk), and observer number B is calculated using the inquiry number(c) and then the observer number B is transmitted to the authentication server. The authentication server verifies the observer number B. Then, the authentication server and the user computer calculate each session key(sk).
Abstract:
PURPOSE: A wireless Internet system using an application layer script and a point to point security session information managing method are provided to manage security information on entire sessions in a web server out of one transaction range, thereby supplying a security service in an application layer among all messages transceived between a browser and the web server. CONSTITUTION: A web server(130) comprises as follows. A script interpreter(132) interprets web daemon receiving a service request of a browser(110) and a script at the request of the web daemon, and performs an interpretation. A script security API(133) supplies a security service of a script, performs security negotiation with the browser(110), and manages session information. A session information object(134) stores the session information. The script security API(133) comprises as follows. A security negotiation API supplies a security negotiation function with the browser(110). A security service API supplies a security service function. A session control block stores and manages security session information negotiated with the browser(110).
Abstract:
무선랜침입방지를위한채널스케줄링장치및 방법이개시된다. 채널스케줄링장치는통신모뎀을통해수신되는무선랜패킷을이용하여침입관련정보를확인하고, 상기확인된침입관련정보에기초하여무선랜채널의모니터링스케줄을결정할수 있으며, 상기모니터링스케줄은채널의중요도에따라모니터링시간이동적으로변경될수 있다.